AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
Is it safe?
No known CVEs for https.
No authentication — any process on your machine can connect to this server.
MIT. View license →
Last scanned 0 days ago.
Is it maintained?
Last commit 0 days ago. 7,015 GitHub stars.
Will it work with my client?
Transport: stdio, sse, http. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
How much context will it use?
3 tools. Estimated ~100 tokens of your context window (0.1% of 200K).
What if it doesn't work?
Common issues: JSON syntax errors in config, Python version mismatch, network or firewall blocking. Setup guide covers troubleshooting. Or check GitHub issues for known problems.
{
"mcpServers": {
"ida-pro-mcp": {
"args": [
"-y",
"@modelcontextprotocol/inspector"
],
"command": "npx"
}
}
}This server supports HTTP transport. Be the first to test it — help the community know if it works.
int_convertConverts integers between different number bases
idalib_openOpens a binary file for analysis in idalib
idalib_switchSwitches to a different idalib session
Last scanned 1h ago
No known vulnerabilities.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.